A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Better Under-Approximation of Programs by Hiding Variables
[chapter]
Lecture Notes in Computer Science
On the negative side, the universal nature of under-approximating transitions makes them dependent on all the variables of the program. ...
The abstraction, on the other hand, often hides some of the variables. ...
Hiding the variable t, however, we can prove the above by showing that pmust − {x,y,pc} (a, a). ...
doi:10.1007/978-3-540-69738-1_23
dblp:conf/vmcai/BallK07
fatcat:vydmqazxarbfvf53azabgzua2q
Selfish Knapsack
2017
PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE
We consider a strategic variant of the knapsack problem: the items are owned by agents, and agents can misrepresent their sets of items---either by hiding items (understating), or by reporting fake ones ...
For the case of two understating-only agents, we provide a specialized randomized strategyproof 1.522-approximate mechanism, and a lower bound of 1.09. ...
Acknowledgements This work was supported in part by CUNY Collaborative Incentive Research Grant (CIRG 21) 2153 and PSC-CUNY Research Award 67665-00 45. ...
doi:10.1609/aaai.v31i1.10579
fatcat:nkh5up3rwfhifpktjigzhk4hoa
Towards alias-free pointers
[chapter]
1996
Lecture Notes in Computer Science
This paper argues that pointer-induced aliasing can be avoided in many cases by means of a concept of unique pointer. ...
The use of such pointers is expected to fortify the concept of encapsulation, to make systems easier to reason about, to provide better control over the interaction between threads, and to make storage ...
Acknowledgment: I would like to thank Alex Borgida, Rock Howard, Yaron Minsky, Partha Pal and Yossi Stein for many useful conversation during the writing of this paper. ...
doi:10.1007/bfb0053062
fatcat:655thqdqanfifanvmg2xtj4gfm
Hybrid cegar: combining variable hiding and predicate abstraction
2007
Computer-Aided Design (ICCAD), IEEE International Conference on
Variable hiding and predicate abstraction are two popular abstraction methods to obtain simplified models for model checking. ...
Our experiments on public benchmarks show that the new abstraction method frequently outperforms the better of the two existing abstraction methods. ...
Variable hiding marks a subset Xv = {x1, . . . , xn} ⊆ X of state variables as visible. The set of remaining variables (called invisible variables) is denoted by Xinv = (X \Xv ). ...
doi:10.1109/iccad.2007.4397283
dblp:conf/iccad/WangKG07
fatcat:d4eqcgiobzgbjcwuku7fdpa5hu
VMM-based hidden process detection and identification using Lycosid
2008
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '08
Use of stealth rootkit techniques to hide long-lived malicious processes is a current and alarming security issue. ...
This research is sponsored by the Sandia National Laboratories Doctoral Studies Program, by NSF CCR-0133456, ITR-0325267, CNS-0509474, and by generous donations from Network Appliance and EMC. ...
CPU inflation works by transparently placing patches in guest program code. ...
doi:10.1145/1346256.1346269
dblp:conf/vee/JonesAA08
fatcat:3igcjjy6r5dcljjxxlvd624nwi
Static Analysis to Model & Measure OO Paradigms
2010
International Journal of Computer Applications
In this work we tried to refine metrics especially for object-oriented programming and set of these metrics has been defined. ...
Field of reverse engineering is expanding its horizon day by day; it requires reusability not only at code level but also at higher level which can measure the analysis results and original system. ...
This model help in better understanding of source program by presenting the code file in simple text mode and analyse it with the help of metrics. ...
doi:10.5120/226-377
fatcat:xms4qw2u5fdmjam7ur3xolzr2e
Page 6448 of Mathematical Reviews Vol. , Issue 2003h
[page]
2003
Mathematical Reviews
Similarly, a basis consis- tent with the introduction of a self-similar variable for the infinite domain problems (boundary value problems) can be reproduced by the quasi-steady approximation by selecting ...
Hide found that the (3,3) system obtained by including the motor but in the absence of eddy currents, does not have any oscillatory so- lutions. ...
Mathematical Tools of Soft Computing
2014
Mathematical Problems in Engineering
The adaptive memory programming is adopted in this study to enhance the performance of classic EDA by deriving a better approximation for the true distribution of the target solutions. ...
and optimization of software programs based on symbolic-numeric computation" by H. ...
The hard work of all reviewers is greatly acknowledged. Without them, this special issue can never become possible.
Ker-Wei Yu Yang Xu Jer-Guang Hsieh ...
doi:10.1155/2014/904014
fatcat:gs4ugjintbf5xopjwjq34tx5sq
Automatic Optimization of Thread Mapping for a GPGPU Programming Framework
2015
International Journal of Networking and Computing
As the result of evaluation, our scheme could find optimal mapping strategies for five benchmark programs. ...
Based on a virtual shared memory model, MESI-CUDA hides low-level memory management and data transfer from the user. ...
Acknowledgment This work was supported by JSPS KAKENHI Grant Number 24500060. ...
doi:10.15803/ijnc.5.2_253
fatcat:4jjyuow3evhhjff3fjfrqivceu
Automatic Optimization of Thread Mapping for a GPGPU Programming Framework
2014
2014 Second International Symposium on Computing and Networking
As the result of evaluation, our scheme could find optimal mapping strategies for five benchmark programs. ...
Based on a virtual shared memory model, MESI-CUDA hides low-level memory management and data transfer from the user. ...
Acknowledgment This work was supported by JSPS KAKENHI Grant Number 24500060. ...
doi:10.1109/candar.2014.104
dblp:conf/ic-nc/OhnoKMM14
fatcat:7dnjlez3evh27kwoi3ca6y67oi
A steganography strategy based on equivalence partitions of hiding units
2010
2010 IEEE International Conference on Multimedia and Expo
Because of considering the relation between the length of message and capacity, the performance of the hiding method using proposed hiding strategy outperforms the original approaches when embedding the ...
According to a constructed equivalence relation based on the capacity of hiding units, all hiding units can be partitioned into equivalence classes. ...
60803147), the New Teacher Program Foundation
(200802131023) and Major State Basic Research
Development Program of China (973 Program)
(2009CB320906). ...
doi:10.1109/icme.2010.5583275
dblp:conf/icmcs/LiuYZG10
fatcat:u7vf6ck5dvgy3pz2hcknmhhg44
A Graph Theoretic Approach to Software Watermarking
[chapter]
2001
Lecture Notes in Computer Science
Under some natural assumptions about the code added to embed the WM, locating the WM by an attacker is related to some graph approximation problems. ...
Since little theoretical foundation exists for hardness of typical instances of graph approximation problems, we present heuristics to generate such hard instances and, in a limited case, present a heuristic ...
Thus this step gives us one sample (N c ) for a random variable that under the hypothsis has an expectation of E(X c ) = N p c . ...
doi:10.1007/3-540-45496-9_12
fatcat:qflfbaaatraz5o2vjfc5pv5bb4
Nonsmooth trajectory optimization - An approach using continuous simulated annealing
1994
Journal of Guidance Control and Dynamics
Again, Hide- and-Seek consistently obtained solutions better than those found by Principal Axis and Nelder-Mead Simplex. Improvements ranged from 19.4 to 44.8%. ...
Acknowledgments
This work was supported in part by NASA Langley Research Center under grant NAG-1-1255. ...
doi:10.2514/3.21256
fatcat:nlhb3hxzfjeefog7h4d2gt3gtm
Microbiological Testing for the Proper Assessment of the Hygiene Status of Beef Carcasses
2019
Microorganisms
The proposed model can be used as a valuable tool for the design and adoption of feasible quality control programs in beef industries. ...
In this study, the hygiene status of beef carcasses sampled in eight Brazilian slaughterhouses was assessed by enumeration of different hygiene indicator microorganisms, and a model to establish potential ...
The source of error is the inherent variability of the system, shown by the results of replicated measurements. ...
doi:10.3390/microorganisms7030086
pmid:30893864
pmcid:PMC6462900
fatcat:vcjeh4q6kvcs3m7vponfty6k2e
Sustainability assessment of land transactions and project benefits sharing in Papua New Guinea
English
2021
Journal of Land Management and Appraisal
English
There is an increasing concern that land transactions in Papua New Guinea are perceived by some landowners and key government officials as unsustainable due to inequitable sharing of benefits among the ...
The paper, therefore, calls for government intervention to streamline national land transactions for consistency and sustainability under a common national land policy. ...
of 0.01 between the two variables. ...
doi:10.5897/jlma2021.0022
fatcat:wmg6vaas3vbmroua4vw76dmtii
« Previous
Showing results 1 — 15 out of 62,277 results